Showing 21 - 40 results of 17,262 for search '((cheaters OR (sars OR ((code OR mode) OR pore))) OR (peers OR years))*', query time: 0.21s Refine Results
  1. 21

    8 bit asynchronous SAR ADC by Mahesha, Ballaki Aditya

    Published 2024
    “…In this project, we propose the design of an 8-bit Asynchronous Successive Approximation Register (SAR) Analog-to-Digital Converter (ADC). This ADC is engineered to resolve signals up to 100 MHz and can perform conversions at a clock speed of 200 MHz. …”
    Get full text
    Final Year Project (FYP)
  2. 22

    Exploration of PolSAR image processing by Yi, Tianya

    Published 2020
    “…Polarimetric synthetic aperture radar (PolSAR) is a widely used tool for radar remote sensing of the Earth. …”
    Get full text
    Final Year Project (FYP)
  3. 23
  4. 24

    Game theoretical, statistical and behavioural aspects of peer evaluation by Tan, Catherine Ser Ping

    Published 2021
    “…Another common concern with the current methods of peer evaluation is that students often do not have the necessary skills to evaluate the work of their peers objectively. …”
    Get full text
    Final Year Project (FYP)
  5. 25

    Design and development of an online platform for peer tutorial scheme by Heng, Nadine Nyi Zheng

    Published 2021
    “…Notably, NTU’s School of Electronic and Electrical Engineering Student Life Development Unit SEENIORS Program, a relatively young peer tutoring scheme aimed at helping academically challenged students in school of EEE, currently only conducts its classes physically. …”
    Get full text
    Final Year Project (FYP)
  6. 26

    Effects of peer pressure on endogenous goal setting and performance by Lim, Wee Meng, Chua, Shannen Qi Shan, Tan, Li Xuan

    Published 2019
    “…We investigate whether peer pressure has effects on endogenous goal setting and performance. …”
    Get full text
    Final Year Project (FYP)
  7. 27
  8. 28

    Girl code by Navarro Jirah Marie Bathan

    Published 2021
    Get full text
    Final Year Project (FYP)
  9. 29
  10. 30

    Role of the pore-size distribution function on water flow in unsaturated soil by Zhai, Qian, Rahardjo, Harianto, Satyanaga, Alfrendo, Priono, Dai, Guo-liang

    Published 2020
    “…Previous research has indicated that the hydraulic properties of soil are dependent on its pore-size distribution. An improved capillary model is now proposed to explain the concept of the pore-size distribution in soil and its relationship to SWCC. …”
    Get full text
    Journal Article
  11. 31

    The role of graphite foam pore structure on saturated pool boiling enhancement by Pranoto, I., Leong, K. C., Jin, L. W.

    Published 2013
    “…Block and fin evaporators of different fin-to-block-surface-area ratios (AR) were designed to study the role of the internal pore structure of graphite foams in a compact air-cooled thermosyphon under saturated pool boiling condition for high heat flux electronics cooling applications. …”
    Get full text
    Get full text
    Journal Article
  12. 32

    The MFA years by Desker, Barry

    Published 2022
    Get full text
    Book Chapter
  13. 33

    On List-Decodability of Random Rank Metric Codes and Subspace Codes by Ding, Yang

    Published 2016
    Subjects: “…Constant-dimension subspace codes…”
    Get full text
    Get full text
    Journal Article
  14. 34
  15. 35

    TCM (Trellis Coded Modulation) codes for fading mobile channels by Dubey, Vimal Kishore., Gunawan, Erry., Subramanian, Krishnappa R.

    Published 2008
    “…This project addresses the problem of optimising the TCM codes for fading channels. The TCM codes examined are multiple TCM (MTCM) codes, the multidimensional TCM (MDTCM) and asymmetric TCM structures.…”
    Get full text
    Research Report
  16. 36

    New optimal asymmetric quantum codes from constacyclic codes by Guanghui, Zhang, Bocong, Chen, Liangchen, Li

    Published 2014
    “…In this paper, we construct two classes of asymmetric quantum codes by using constacyclic codes. The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. …”
    Get full text
    Get full text
    Journal Article
  17. 37

    Synthesis of code-reuse attacks from p-code programs by Melham, TF, DenHoed, M

    Published 2025
    “…Our method reasons about machine code via abstraction to the p-code intermediate language of Ghidra, a well-established software reverse-engineering framework. …”
    Conference item
  18. 38
  19. 39
  20. 40